[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Gaim festival plugin exploit
- To: HCTITS Security Division <security@humancentrictech.com>
- Subject: Re: Gaim festival plugin exploit
- From: merlyn@stonehenge.com (Randal L. Schwartz)
- Date: 20 Oct 2003 11:09:50 -0700
>>>>> "HCTITS" == HCTITS Security Division <security@humancentrictech.com>
>>>>> writes:
HCTITS> DUH... would help if I attached my attachment.
Is this is repeat? I'm going to repeat myself then.
YOUR FIX DOES NOT HELP. Please use my posted fix.
>> system("echo \"$string\" | /usr/bin/festival --tts");
Replace this with
open FEST, "|/usr/bin/festival --tts";
print FEST $string, "\n";
close FEST;
No shells involved. Only DOS exploits and maybe the usual
C-language overflows in festival itself.
--
Randal L. Schwartz - Stonehenge Consulting Services, Inc. - +1 503 777 0095
<merlyn@stonehenge.com> <URL:http://www.stonehenge.com/merlyn/>
Perl/Unix/security consulting, Technical writing, Comedy, etc. etc.
See PerlTraining.Stonehenge.com for onsite and open-enrollment Perl training!